Method for utilizing an encrypted key as a key identifier in a d

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, 380 29, 380 49, H04L 908, H04L 906

Patent

active

050816780

ABSTRACT:
The nodes in a computer network utilize an encrypted key as a key identifier in a data packets transferred between nodes which eliminates the need for a receiving node to perform a memory look up operation to ascertain the key used to encrypt the data. Each node is provided with a master key that is unique to each node. When two nodes want to establish communications they first negotiate a shared key. This shared key is then encrypted under each nodes' master key. The nodes then exchange their respective encrypted key. The encrypted key of the receiving node is placed in the data packet to be sent by the transmitting node. Upon receiving a data packet, the receiving node decrypts the encrypted key to determine the shared key. This shared key is then used to decrypt encrypted data in the data packet.

REFERENCES:
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4578530 (1986-03-01), Zeidler
patent: 4578531 (1986-03-01), Everhart et al.
patent: 4613901 (1986-09-01), Gilhousen et al.
patent: 4731840 (1988-03-01), Mniszewski et al.
patent: 4736422 (1988-04-01), Mason
patent: 4771458 (1988-09-01), Citta et al.
patent: 4771459 (1988-09-01), Jansen
patent: 4805216 (1989-07-01), Gruenberg
patent: 4887296 (1989-12-01), Horne
patent: 4888800 (1989-12-01), Marshall et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for utilizing an encrypted key as a key identifier in a d does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for utilizing an encrypted key as a key identifier in a d, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for utilizing an encrypted key as a key identifier in a d will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-546668

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.